Up until now, you have learned about the basics of authentication and authorization. In this section, you will see these two most important ways of securing an application in action.
Authentication and authorization in action
Basic authentication, token-based authorization, and other authentications
Whenever you’re talking about secured web services/web applications, you should think about the all the points I mentioned regarding authentication and authorization in the previous sections.
In this section, I’m going to discuss authentication and authorization at the implementation stage.